CVE-2012-3479 in Emacsinfo

Zusammenfassung (Englisch)

lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Reservieren

14.06.2012

Veröffentlichung

25.08.2012

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Interested in the pricing of exploits?

See the underground prices here!